Skip to content

Commit

Permalink
Revert commit 35044e8
Browse files Browse the repository at this point in the history
This reverts commit 35044e8 because of the broken references in #133
  • Loading branch information
isaak654 committed Oct 15, 2023
1 parent 35044e8 commit 0b12f87
Show file tree
Hide file tree
Showing 22 changed files with 257 additions and 2,983 deletions.
76 changes: 38 additions & 38 deletions PlusContent/BoxSnapshots.md
Original file line number Diff line number Diff line change
@@ -1,38 +1,38 @@
# Box Snapshots (for Sandboxie Plus)

A **snapshot** saves the current state of a sandbox. You can create multiple snapshots of a box at different times and make one of the snapshots the default. To get started, open the Sandman GUI, right-click on the desired sandbox and click 'Snapshots Manager' from the drop-down list. See image below.

![](../Media/Box_Snapshot1.png)

- Note that you cannot create a snapshot if the box is empty (an error message is displayed).
- Note that you cannot create a snapshot if there are running processes in the box.

![](../Media/Box_Snapshot2.png)

**Caveat:** Snapshots must be created with box AutoDelete disabled. To do so, open the Sandman GUI and double-click on the desired box to bring up the box options window. Then, click on 'File Options' and, under 'Box Delete Options', uncheck the option to AutoDelete content, and press OK (bottom right) to apply any changes. See image below.

![](../Media/Box_AutoDelete.png)

**Installing Software to a Box and Creating a Snapshot:**
- Select a box, disable AutoDelete, install the software to this box, set it up just the way you like.
- Then, close the box, create a snapshot and enable box AutoDelete.
- Now, this box will revert to the snapshot you created whenever it is closed.

**Updating Software Installed to a Box:**
- Create a pre-update snapshot (for a baseline you can revert to, if need be).
- Disable box AutoDelete, update the software and test.
- If all is well, create a post-update snapshot, enable box AutoDelete.
- This automatically makes the last (post-update) snapshot the default.
- If there are problems, you can revert to the pre-update snapshot.
- You can always revert to any of the snapshots that you create for a box!

You have the ability to create a snapshot, remove a snapshot, revert to a snapshot or (starting with **Sandboxie Plus v1.0.9**) revert to an empty box while retaining all snapshots.

**Caveat:** It is wise to use the snapshot features only for boxes whose location is on a real disk (and not on a ramdisk).

**Additional Details:**
- Each snapshot is created its own folder, labeled snapshot-n, where the number n is the snapshot id. You can change this label.
- All snapshot folders for a given box are inside the box folder.
- The snapshot layout and information on the current (default) snapshot are saved in the file **snapshot.ini** in the box folder.
- The **File-System** snapshots are incremental. Files are duplicated only when changed (just as with real files on the host).
- The **Registry** snapshots are NOT incremental. Each snapshot has a full copy and only the most recent reg hive file is used.
# Box Snapshots (for Sandboxie Plus)

A **snapshot** saves the current state of a sandbox. You can create multiple snapshots of a box at different times and make one of the snapshots the default. To get started, open the Sandman GUI, right-click on the desired sandbox and click 'Snapshots Manager' from the drop-down list. See image below.

![](../Media/Box_Snapshot1.png)

- Note that you cannot create a snapshot if the box is empty (an error message is displayed).
- Note that you cannot create a snapshot if there are running processes in the box.

![](../Media/Box_Snapshot2.png)

**Caveat:** Snapshots must be created with box AutoDelete disabled. To do so, open the Sandman GUI and double-click on the desired box to bring up the box options window. Then, click on 'File Options' and, under 'Box Delete Options', uncheck the option to AutoDelete content, and press OK (bottom right) to apply any changes. See image below.

![](../Media/Box_AutoDelete.png)

**Installing Software to a Box and Creating a Snapshot:**
- Select a box, disable AutoDelete, install the software to this box, set it up just the way you like.
- Then, close the box, create a snapshot and enable box AutoDelete.
- Now, this box will revert to the snapshot you created whenever it is closed.

**Updating Software Installed to a Box:**
- Create a pre-update snapshot (for a baseline you can revert to, if need be).
- Disable box AutoDelete, update the software and test.
- If all is well, create a post-update snapshot, enable box AutoDelete.
- This automatically makes the last (post-update) snapshot the default.
- If there are problems, you can revert to the pre-update snapshot.
- You can always revert to any of the snapshots that you create for a box!

You have the ability to create a snapshot, remove a snapshot, revert to a snapshot or (starting with **Sandboxie Plus v1.0.9**) revert to an empty box while retaining all snapshots.

**Caveat:** It is wise to use the snapshot features only for boxes whose location is on a real disk (and not on a ramdisk).

**Additional Details:**
- Each snapshot is created its own folder, labeled snapshot-n, where the number n is the snapshot id. You can change this label.
- All snapshot folders for a given box are inside the box folder.
- The snapshot layout and information on the current (default) snapshot are saved in the file **snapshot.ini** in the box folder.
- The **File-System** snapshots are incremental. Files are duplicated only when changed (just as with real files on the host).
- The **Registry** snapshots are NOT incremental. Each snapshot has a full copy and only the most recent reg hive file is used.
52 changes: 26 additions & 26 deletions PlusContent/DNSFilter.md
Original file line number Diff line number Diff line change
@@ -1,27 +1,27 @@
# DNS Filter

In the dynamic landscape of digital security and network management, Sandboxie-Plus strides forward with a groundbreaking addition to its repertoire – DNS Query Logging, Filtering, and Redirection. This feature emerges as a pivotal enhancement within the realm of sandboxing, offering users an unparalleled level of control over network interactions. Empowering users with the ability to monitor, filter, and redirect DNS queries initiated by sandboxed programs for specific domains, this innovation revolutionizes the way network activities are managed within sandboxed environments.

## A Deeper Look into DNS Query Control
The introduction of DNS Query Logging, Filtering, and Redirection signifies a remarkable advancement in the capabilities of Sandboxie-Plus. This feature is the embodiment of precision control, allowing users to influence how sandboxed applications interact with the Domain Name System (DNS). By delving into DNS activities, users can effectively manage and tailor network access, resulting in heightened security, granular oversight, and enhanced privacy.

## The Power of Control
DNS Query Control shifts the balance of power towards users, granting them unprecedented control over how sandboxed programs interact with DNS servers. This control manifests in a multitude of benefits:

### 1. Security Reinforcement:
With the ability to filter and block DNS queries for specific domains, users can mitigate potential security risks. Malicious domains or known threat vectors can be preemptively blocked, shielding the system from potential hazards.

### 2. Privacy Enhancement:
By redirecting certain DNS queries, users can ensure that sensitive information remains confidential. This redirection curtails instances where sandboxed applications inadvertently reveal confidential data through DNS queries.

### 3. Content Control:
DNS Query Control allows users to manage content access. Unwanted domains or inappropriate content can be blocked, ensuring that sandboxed applications are limited to approved and safe online resources.

### 4. Network Analysis:
The logging component of this feature offers users the opportunity to monitor DNS activities. This data can provide insights into the behavior of sandboxed applications, potentially revealing any anomalous or suspicious network activity.

## How DNS Query Control Works
The mechanics of DNS Query Control are elegantly intricate. Users can selectively block or redirect DNS queries made by sandboxed programs for specific domains. This process involves defining rules within the sandbox configuration, dictating how DNS queries to certain domains should be handled. This level of granularity empowers users to tailor the DNS experience within the sandboxed environment according to their security and privacy preferences.

## Embrace the Future of Network Control
# DNS Filter

In the dynamic landscape of digital security and network management, Sandboxie-Plus strides forward with a groundbreaking addition to its repertoire – DNS Query Logging, Filtering, and Redirection. This feature emerges as a pivotal enhancement within the realm of sandboxing, offering users an unparalleled level of control over network interactions. Empowering users with the ability to monitor, filter, and redirect DNS queries initiated by sandboxed programs for specific domains, this innovation revolutionizes the way network activities are managed within sandboxed environments.

## A Deeper Look into DNS Query Control
The introduction of DNS Query Logging, Filtering, and Redirection signifies a remarkable advancement in the capabilities of Sandboxie-Plus. This feature is the embodiment of precision control, allowing users to influence how sandboxed applications interact with the Domain Name System (DNS). By delving into DNS activities, users can effectively manage and tailor network access, resulting in heightened security, granular oversight, and enhanced privacy.

## The Power of Control
DNS Query Control shifts the balance of power towards users, granting them unprecedented control over how sandboxed programs interact with DNS servers. This control manifests in a multitude of benefits:

### 1. Security Reinforcement:
With the ability to filter and block DNS queries for specific domains, users can mitigate potential security risks. Malicious domains or known threat vectors can be preemptively blocked, shielding the system from potential hazards.

### 2. Privacy Enhancement:
By redirecting certain DNS queries, users can ensure that sensitive information remains confidential. This redirection curtails instances where sandboxed applications inadvertently reveal confidential data through DNS queries.

### 3. Content Control:
DNS Query Control allows users to manage content access. Unwanted domains or inappropriate content can be blocked, ensuring that sandboxed applications are limited to approved and safe online resources.

### 4. Network Analysis:
The logging component of this feature offers users the opportunity to monitor DNS activities. This data can provide insights into the behavior of sandboxed applications, potentially revealing any anomalous or suspicious network activity.

## How DNS Query Control Works
The mechanics of DNS Query Control are elegantly intricate. Users can selectively block or redirect DNS queries made by sandboxed programs for specific domains. This process involves defining rules within the sandbox configuration, dictating how DNS queries to certain domains should be handled. This level of granularity empowers users to tailor the DNS experience within the sandboxed environment according to their security and privacy preferences.

## Embrace the Future of Network Control
DNS Query Logging, Filtering, and Redirection transcends traditional sandboxing capabilities. It introduces an unprecedented level of network oversight, effectively placing users at the helm of their sandboxed network interactions. In an age where data security, privacy, and control are paramount, this feature stands as a beacon of innovation. Join us in embracing the dawn of network control with DNS Query Logging, Filtering, and Redirection – where every DNS interaction is precisely managed to align with your security vision.

0 comments on commit 0b12f87

Please sign in to comment.